Securing Your Computer; Using A Computer Security Lock; Using Passwords - Acer Predator Helios 500 User Manual

Hide thumbs Also See for Predator Helios 500:
Table of Contents

Advertisement

S
E C U R I N G Y O U R C O M P U T E R
Your computer is a valuable investment that you need to
take care of. Learn how to protect and take care of your
computer.
Security features include hardware and software locks — a
security notch and passwords.

Using a computer security lock

The computer comes with a computer security slot for a
security lock.
Wrap a computer security lock cable around an immovable
object such as a table or handle of a locked drawer. Insert
the lock into the notch and turn the key to secure the lock.
Some keyless models are also available.

Using passwords

Passwords
access. Setting these passwords creates several different
levels of protection for your computer and data:
• Supervisor Password prevents unauthorized entry into the
BIOS utility. Once set, you must enter this password to
gain access to the BIOS utility. See Setting passwords on
page 49.
• User
unauthorized use. Combine the use of this password with
password checkpoints on boot-up and resume from
Hibernation (if available) for maximum security.
• Password
unauthorized use. Combine the use of this password with
protect
your
Password
secures
on
Boot
computer
your
secures
your

Securing your computer - 47

from
unauthorized
computer
against
computer
against

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ph517-51Ph517-61

Table of Contents